Watch Series | Lara Croft: Tomb Raider | Ciara - Sorry.
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Semiconductors and the Information Revolution: Magic Crystals that made IT Happen
Semiconductors and the Information Revolution: Magic Crystals that made IT Happen
This book sets out to explain the development of modern electronic systems and devices from the viewpoint of the semiconductor materials (germanium, silicon, gallium arsenide and many others) which made them possible. It covers the scientific understanding of these materials and its intimate relationship with their technology and many applications....
One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work
One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work

Turn your one simple idea into millions―without lifting a finger!

“Ever heard of Teddy Ruxpin or Lazer Tag? Both have Stephen Key’s mark on them. He is the Yoda or ‘renting’ ideas for serious passive income. From how-to to war stories, this is a great book.”
―Tim Ferriss, author
...

Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)
Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)

Ultra-wideband (UWB) radios are expected to play a revolutionary role in the future of wireless communications systems. The great interest in UWB communications was sparked by FCC rulings in February 2002 that authorized the unlicensed commercial deployment of UWB technology under a strict power control in 7500 MHz of spectrum. This...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Nanotechnology : Science, Innovation, and Opportunity
Nanotechnology : Science, Innovation, and Opportunity

 

Inside the Emerging Multibillion-Dollar Nanotechnology Industry

Suddenly, nanotechnology isn't science fiction or mere theory: It's becoming one of the world's fastest-growing, highest-impact industries. In Nanotechnology: Science, Innovation, and...

Microsoft Excel 2000 Functions in Practice (Que Quick Reference)
Microsoft Excel 2000 Functions in Practice (Que Quick Reference)
The Microsoft Excel 2000 Functions in Practice provides in-depth information on the functions that will maximize your use of the analytical tools within Excel 2000. Packed with examples and detailed insight into both the functions and their uses, this reference includes more than just discussions of the functions—it offers practical,...
XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World
XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World

In order for a business to thrive in today’s dynamic world, its computing infrastructure must enable the secure flow of information—not only within the business but also with suppliers and customers. However, many of today’s computing infrastructures suffer from “information chaos” and are unable to support this...

MacIntosh Technology in the Common Hardware Reference Platform
MacIntosh Technology in the Common Hardware Reference Platform
This book presents specifications and standards for the Apple Macintosh technology cited in the PowerPC Microprocessor Common Hardware Reference Platform (CHRP) specification.

The CHRP specification is a joint publication of Apple Computer, Inc., International Business Machines Corporation, and Motorola, Inc. It defines a common hardware
...
Cryptography in C and C++
Cryptography in C and C++
  • Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
  • Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
  • Not toy code(tm), but a practical treatment of modern cryptographic...
Math You Can't Use: Patents, Copyright, and Software
Math You Can't Use: Patents, Copyright, and Software
The field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means...
Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Psychiatry today is a barren tundra, writes medical historian Edward Shorter, where drugs that don't work are used to treat diseases that don't exist. In this provocative volume, Shorter illuminates this dismal landscape, in a revealing account of why psychiatry is "losing ground" in the struggle to treat depression.

...
Streaming Media: Building and Implementing a Complete Streaming System
Streaming Media: Building and Implementing a Complete Streaming System
A complete toolkit to successfully develop and implement streaming media on the Web

From hands-on training and distance learning to teleconferencing and product demonstrations, streaming media is providing businesses with a whole new world of opportunity. Written by one of the leading experts in the field, this book will provide you with all...

Result Page: 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy